About your Search

20130121
20130129
Search Results 0 to 3 of about 4
miller former assistant fbi director. good morning. >> good morning. this is the seventh report it's up, what does it tell us? >> well it tells us that computers and electronic communications are more and more involved in the commissions of crime, but it also tells us that law enforcement is getting more adept at figuring out how to use these things to do everything from mapping a suspect's social network to try to determine if they can find the criminal network in there as well as determining if something's happening. >> should we be worried about this because they're using this as kind of warrantless searches. >> okay, so there's a lot of press out there about this and the headlines all say government warrantless snooping of your e-mail is up. these are very charged terms so let's do a quick civics lesson on how this is supposed to work in real life. when they talk about subpoenas, when you look at the numbers, you see the big numbers are in subpoenas, and then the smaller numbers are in court orders and other things so when you're talking about subpoenas, that
? >> we've tot use a stepladder approach. if you ever talked to an fbi or dea agent and their case lode, the idea that they have time to go snooping through people's e-mail is absurd, wu when you talk about what it takes to get that, a subpoena is for transactional data. if you want content organization view to go to a judge to get an order. >> you were suggesting that no law enforcement official with access is always going to exercise perfect discretion and integrity. >> i would say that's definitely not true. >> we are all human. >> but i mean i think -- i think what you have here is they make more mistakes than they have things through malice. when the fbi got the national security's letter's power from the patriot act, the inspector general did an awe did and found out there were widespread abuses of the nsl and what you saw were a very small percentage of days where you saw the complexity of the process to fill these thing out and get them, that they made a lot of mistakes. you also found they weren't getting information even through the nfls they messed that they weren't otherwise
.c. police force, secret service, fbi, and other agencies. bob orr takes a closer look at the security behind this ceremony. >> reporter: at union station, tsa viper security teams are checking trains and passengers. in a show of force designed to be a deterrent. >> if someone walks in and sees a group of officers and turns around immediately and leaves the station, that's a good indication that perhaps they have something to hide. >> reporter: not all security is so obvious. these two men with backpacks are undercover behavioral detection officers working in tandem with uniformed patrols at rail stations and airports. along d.c.'s waterfront coast guard fast boats are increasing surveillance runs. this is a floating command center. for 48 hours surrounding the inaugural time frame these waters around washington will be closed as more than 20 coast guard and police boats conduct patrols of 20 miles of shore watch. and at the edges of the restricted zone, the coast guard is watching for any suspect boaters. >> if they're in key specific areas or near critical
of terrorism right across north africa. norah, charlie? >> allen, thank you. john miller former assistant fbi director, good morning. >> good morning. >> what do you make of this new statement that says these attacks will continue? >> one it says the group is doubling down. you would look at this through any normal prism, say it was a stunning defeat. they're not going to look at it that way. their people have gone to martyrdom, they'll get their reward in heaven, now on the map because they got publicity and that will affect places where they have a footprint, that could be libya, niger, mali chad, you know, anywhere in the region. >> northern africa is certainly a focal point. what does it mean that two of the hostage takers were canadian? that doesn't seem to sort of fit with the normal description of these terrorists. >> that could mean a couple of things, which is they have a successful recruiting arm over the internet to get canadians to come over. it could mean that they were algerians who went to canada to receive asylum and then were recruited by the group but
Search Results 0 to 3 of about 4